Establishing a virtual tunnel between two computer programs

Shedrinsky June 21, 2

Patent Grant 7966418

U.S. patent number 7,966,418 [Application Number 10/784,138] was granted by the patent office on 2011-06-21 for establishing a virtual tunnel between two computer programs. This patent grant is currently assigned to Axeda Corporation. Invention is credited to Felix Shedrinsky.


United States Patent 7,966,418
Shedrinsky June 21, 2011
**Please see images for: ( Certificate of Correction ) **

Establishing a virtual tunnel between two computer programs

Abstract

A system transfers data via a communication session between a client application and a server application, where the client application runs on a first network and the server application runs on a second network. The system includes a proxy having a socket to the client application. The proxy converts data between a local protocol run on the first network to a non-local protocol. An agent creates a socket to the server application. The agent converts data between a local protocol run on the second network and the non-local protocol. A server is in communication with the proxy and the agent. The server contains a message queue dedicated to the communication session. The message queue stores data transmitted during the communication session.


Inventors: Shedrinsky; Felix (Weymouth, MA)
Assignee: Axeda Corporation (Foxboro, MA)
Family ID: 34082966
Appl. No.: 10/784,138
Filed: February 20, 2004

Prior Publication Data

Document Identifier Publication Date
US 20050021772 A1 Jan 27, 2005

Related U.S. Patent Documents

Application Number Filing Date Patent Number Issue Date
60449213 Feb 21, 2003

Current U.S. Class: 709/237; 726/11; 726/12
Current CPC Class: H04L 63/0281 (20130101); H04L 67/10 (20130101); G06F 16/955 (20190101); H04L 67/42 (20130101)
Current International Class: G06F 15/16 (20060101)
Field of Search: ;709/237,230 ;726/11-12

References Cited [Referenced By]

U.S. Patent Documents
4086434 April 1978 Bocchi
4412292 October 1983 Sedam et al.
4497037 January 1985 Kato et al.
4583834 April 1986 Seko et al.
4853946 August 1989 Elliott et al.
4962368 October 1990 Dobrzanski et al.
4964065 October 1990 Hicks et al.
4965946 October 1990 Hegedus et al.
4996703 February 1991 Gray
5038319 August 1991 Carter et al.
5057866 October 1991 Hill, Jr. et al.
5061837 October 1991 Gilbert et al.
5077582 December 1991 Kravette et al.
5084875 January 1992 Weinberger et al.
5129080 July 1992 Smith
5138377 August 1992 Smith et al.
5163151 November 1992 Bronikowski et al.
5184179 February 1993 Tarr et al.
5204699 April 1993 Birnbaum et al.
5212645 May 1993 Wildes et al.
5214772 May 1993 Weinberger et al.
5216461 June 1993 Maekawa et al.
5220380 June 1993 Hirata et al.
5224157 June 1993 Yamada et al.
5243382 September 1993 Takano et al.
5257069 October 1993 Hirata et al.
5261061 November 1993 Ju
5270775 December 1993 Suzuki
5282127 January 1994 Mii
5291244 March 1994 Kajiwara et al.
5293196 March 1994 Kaneko et al.
5297034 March 1994 Weinstein
5297256 March 1994 Wolstenholme et al.
5300980 April 1994 Maekawa et al.
5303005 April 1994 Takano et al.
5305055 April 1994 Ebner et al.
5305199 April 1994 LoBiondo et al.
5307263 April 1994 Brown
5325156 June 1994 Ulinski
5333286 July 1994 Weinberger et al.
5335048 August 1994 Takano et al.
5339168 August 1994 Evanitsky et al.
5342037 August 1994 Martin
5347346 September 1994 Shimizu et al.
5359391 October 1994 Kuroyanagi et al.
5361265 November 1994 Weinberger et al.
5365310 November 1994 Jenkins et al.
5367667 November 1994 Wahlquist et al.
5369469 November 1994 Leo et al.
5369471 November 1994 Yamada
5369472 November 1994 Raj et al.
5373349 December 1994 Ito
5384622 January 1995 Hirata et al.
5386271 January 1995 Maekawa et al.
5392095 February 1995 Siegel
5398257 March 1995 Groenteman
5404199 April 1995 Hirata et al.
5412779 May 1995 Motoyama
5414494 May 1995 Aikens et al.
5420667 May 1995 Kaneko et al.
5424808 June 1995 Maekawa et al.
5424844 June 1995 Koyanagi et al.
5428551 June 1995 Trainor et al.
5430709 July 1995 Galloway
5434650 July 1995 Nakahara et al.
5442541 August 1995 Hube et al.
5444517 August 1995 Nagashima
5444851 August 1995 Woest
5446522 August 1995 Tahara et al.
5452057 September 1995 Imaizumi et al.
5459552 October 1995 Ohira
5463775 October 1995 DeWitt et al.
5469353 November 1995 Pinsky et al.
5485142 January 1996 Stute et al.
5488454 January 1996 Fukada et al.
5491535 February 1996 Hirata et al.
5493364 February 1996 Kuroyanagi et al.
5517491 May 1996 Nanni et al.
5528691 June 1996 Rosauer et al.
5530899 June 1996 MacDonald
5543892 August 1996 Hirata et al.
5548376 August 1996 Kikuno
5550957 August 1996 Davidson, Jr. et al.
5555191 September 1996 Hripcsak
5561501 October 1996 Honma
5572672 November 1996 Dewitt et al.
5579087 November 1996 Salgado
5586254 December 1996 Kondo et al.
5594529 January 1997 Yamashita et al.
5600301 February 1997 Robinson, III
5600403 February 1997 Inoo
5603060 February 1997 Weinberger et al.
5603323 February 1997 Pflugrath et al.
5619024 April 1997 Kolls
5619716 April 1997 Nonaka et al.
5631724 May 1997 Sawada et al.
5636008 June 1997 LoBiondo et al.
5636333 June 1997 Davidson, Jr. et al.
5638427 June 1997 Flemming et al.
5640495 June 1997 Colbert et al.
5642202 June 1997 Williams et al.
5642208 June 1997 Takahashi et al.
5655084 August 1997 Pinsky et al.
5659794 August 1997 Caldarale et al.
5673190 September 1997 Kahleck et al.
5675744 October 1997 Tsujii
5677775 October 1997 Yamaguchi et al.
5694528 December 1997 Hube
5696903 December 1997 Mahany
5699494 December 1997 Colbert et al.
5699523 December 1997 Li et al.
5708908 January 1998 Hirata et al.
5708909 January 1998 Yamashita et al.
5715393 February 1998 Naugle
5715496 February 1998 Sawada et al.
5715823 February 1998 Wood et al.
5720015 February 1998 Martin et al.
5727135 March 1998 Webb et al.
5727248 March 1998 Ogura
5732212 March 1998 Perholtz et al.
5736965 April 1998 Mosebrook et al.
5740801 April 1998 Branson
5745268 April 1998 Eastvold et al.
5748892 May 1998 Richardson
5748907 May 1998 Crane
5752125 May 1998 Yamashita et al.
5752128 May 1998 Yamashita
5752917 May 1998 Fuchs
5761529 June 1998 Raji et al.
5764918 June 1998 Poulter
5768516 June 1998 Sugishima
5772585 June 1998 Lavin et al.
5774052 June 1998 Hamm et al.
5786994 July 1998 Friz et al.
5787149 July 1998 Yousefi et al.
5787278 July 1998 Barton et al.
5790793 August 1998 Higley
5790977 August 1998 Exekiel
5798738 August 1998 Yamada
5801964 September 1998 McCarthy
5809237 September 1998 Watts et al.
5812397 September 1998 Pech et al.
5812874 September 1998 Yamashita et al.
5818603 October 1998 Motoyama
5819015 October 1998 Martin et al.
5819110 October 1998 Motoyama
5822221 October 1998 Groenteman
5826027 October 1998 Pedersen et al.
5828943 October 1998 Brown
5835816 November 1998 Sawada et al.
5835911 November 1998 Nakagawa et al.
5844550 December 1998 Trainor et al.
5845061 December 1998 Miyamoto et al.
5845230 December 1998 Lamberson
5857207 January 1999 Lo et al.
5857967 January 1999 Frid et al.
5862348 January 1999 Pedersen
5862404 January 1999 Onaga
5865745 February 1999 Schmitt et al.
5872635 February 1999 Akiyama
5872928 February 1999 Lewis et al.
5873009 February 1999 Yamashita et al.
5873659 February 1999 Edwards et al.
5878746 March 1999 Lemelson et al.
5880677 March 1999 Lestician
5884072 March 1999 Rasmussen
5887216 March 1999 Motoyama
5890029 March 1999 Hirata et al.
5894416 April 1999 Kuroyanagi et al.
5897235 April 1999 Honma
5901286 May 1999 Danknick et al.
5905906 May 1999 Goffinet et al.
5909493 June 1999 Motoyama et al.
5911095 June 1999 Atsumi et al.
5913060 June 1999 Discavage
5917405 June 1999 Joao
5923842 July 1999 Pedersen et al.
5933675 August 1999 Sawada et al.
5935060 August 1999 Iliff
5941949 August 1999 Pedersen
5956487 September 1999 Venkatraman et al.
5956698 September 1999 Lachese et al.
5961586 October 1999 Pedersen
5968116 October 1999 Day et al.
5970149 October 1999 Johnson
5974234 October 1999 Levine et al.
5975737 November 1999 Crater et al.
5991810 November 1999 Shapiro et al.
6003061 December 1999 Jones et al.
6003070 December 1999 Frantz
6003078 December 1999 Kodimer et al.
6006045 December 1999 Miyawaki
6009274 December 1999 Fletcher et al.
6009284 December 1999 Weinberger et al.
6012088 January 2000 Li et al.
6014631 January 2000 Teagarden et al.
6014691 January 2000 Brewer et al.
6014694 January 2000 Aharoni et al.
6016535 January 2000 Krantz et al.
6021284 February 2000 Serizawa et al.
6022315 February 2000 Iliff
6023223 February 2000 Baxter, Jr.
6023507 February 2000 Wookey
6023721 February 2000 Cummings
6023722 February 2000 Colyer
6023749 February 2000 Richardson
6025925 February 2000 Davidson, Jr. et al.
6031964 February 2000 Anderson
6041041 March 2000 Ramanathan et al.
6042111 March 2000 Rivers et al.
6057857 May 2000 Bloomfield
6060994 May 2000 Chen
6061603 May 2000 Papadopolous et al.
6064915 May 2000 Kaneko et al.
6065118 May 2000 Bull et al.
6081623 June 2000 Bloomfield et al.
6088718 July 2000 Altschuler et al.
6091915 July 2000 Takagishi
6098116 August 2000 Nixon et al.
6101407 August 2000 Groezinger
6108492 August 2000 Miyachi
6112035 August 2000 Kuroyanagi et al.
6112256 August 2000 Goffinet et al.
6115489 September 2000 Gupta et al.
6118899 September 2000 Bloomfield et al.
6119934 September 2000 Kolls
6122463 September 2000 Nagatani
6125363 September 2000 Buzzeo et al.
6130999 October 2000 Serizawa et al.
6139177 October 2000 Venkatraman et al.
6141737 October 2000 Krantz et al.
6152365 November 2000 Kolls
6157944 December 2000 Pedersen
6161145 December 2000 Bainbridge
6167432 December 2000 Jiang
6167448 December 2000 Hemphill et al.
6172683 January 2001 Bloomfield
6175866 January 2001 Holloway et al.
6181331 January 2001 Trainor et al.
6189113 February 2001 Rabb et al.
6196735 March 2001 Inamine
6205466 March 2001 Karp et al.
6209048 March 2001 Wolff
6221011 April 2001 Bardy
6226650 May 2001 Mahajan et al.
6230199 May 2001 Revashetti et al.
6246485 June 2001 Brown et al.
6256378 July 2001 Iggulden et al.
6256668 July 2001 Slivka et al.
6260148 July 2001 Aggarwal et al.
6260248 July 2001 Cramer et al.
6282454 August 2001 Papadopolous et al.
6282711 August 2001 Halpern et al.
6286038 September 2001 Reichmeyer et al.
6286059 September 2001 Sugiura
6292828 September 2001 Williams
6295527 September 2001 McCormack et al.
6298457 October 2001 Rachlin et al.
6304895 October 2001 Schneider et al.
6307570 October 2001 Stergiades
6308099 October 2001 Fox et al.
6311024 October 2001 Serizawa et al.
6289461 November 2001 Dixon
6312378 November 2001 Bardy
6317570 November 2001 Uchida et al.
6317783 November 2001 Freishtat et al.
6317848 November 2001 Sorens et al.
6325540 December 2001 Lounsberry et al.
6327594 December 2001 Van Huben et al.
6336135 January 2002 Niblett et al.
6338086 January 2002 Curtis et al.
6343320 January 2002 Fairchild et al.
6356933 March 2002 Mitchell et al.
6356949 March 2002 Katsandres et al.
6366741 April 2002 Fukushima
6368284 April 2002 Bardy
6370552 April 2002 Bloomfield
6370570 April 2002 Muir et al.
6370582 April 2002 Lim et al.
6377162 April 2002 Delestienne et al.
6377971 April 2002 Madden et al.
6381557 April 2002 Babula et al.
6397212 May 2002 Biffar
6405310 June 2002 Simpson
6406426 June 2002 Reuss et al.
6412026 June 2002 Graf
6415023 July 2002 Iggulden
6415392 July 2002 Suzuki et al.
6421671 July 2002 Bryan et al.
6426798 July 2002 Yeung
6430612 August 2002 Iizuka
6430711 August 2002 Sekizawa
6434572 August 2002 Derzay et al.
6437692 August 2002 Petite et al.
6437803 August 2002 Panasyuk et al.
6438598 August 2002 Pedersen
6446192 September 2002 Narasimhan et al.
6449633 September 2002 Van et al.
6449663 September 2002 Carney et al.
6453127 September 2002 Wood et al.
6453129 September 2002 Simpson et al.
6457038 September 2002 Defosse
6462831 October 2002 Akiyama
6466971 October 2002 Humpleman et al.
6471521 October 2002 Dornbush et al.
6477117 November 2002 Narayanaswami et al.
6479792 November 2002 Beiermann et al.
6487513 November 2002 Eastvold et al.
6493517 December 2002 Hanson
6493871 December 2002 McGuire et al.
6494831 December 2002 Koritzinsky
6510350 January 2003 Steen et al.
6523013 February 2003 Shah et al.
6523063 February 2003 Miller et al.
6523130 February 2003 Hickman et al.
6529848 March 2003 Sone
6538667 March 2003 Duursma et al.
6549612 April 2003 Gifford et al.
6553336 April 2003 Johnson et al.
6553490 April 2003 Kottapurath et al.
6559965 May 2003 Simpson et al.
6560611 May 2003 Nine et al.
6560641 May 2003 Powderly et al.
6560656 May 2003 O'Sullivan et al.
6564227 May 2003 Sakakibara et al.
6567813 May 2003 Zhu et al.
6574729 June 2003 Fink et al.
6581092 June 2003 Motoyama et al.
6581094 June 2003 Gao
6587812 July 2003 Takayama
6591272 July 2003 Williams
6598011 July 2003 Howards et al.
6601087 July 2003 Zhu et al.
6601159 July 2003 Smith et al.
6604212 August 2003 Sekizawa et al.
6609108 August 2003 Pulliam et al.
6611863 August 2003 Banginwar
6631407 October 2003 Mukaiyama et al.
6636899 October 2003 Rabb et al.
6643650 November 2003 Slaughter et al.
6643690 November 2003 Duursma et al.
6646655 November 2003 Brandt et al.
6651110 November 2003 Caspers et al.
6651190 November 2003 Worley et al.
6654032 November 2003 Zhu et al.
6654720 November 2003 Graham et al.
6654726 November 2003 Hanzek
6665425 December 2003 Sampath et al.
6670810 December 2003 Duncan et al.
6671695 December 2003 McFadden
6681344 January 2004 Andrew
6681349 January 2004 Sekizawa
6684259 January 2004 Discavage et al.
6686838 February 2004 Rezvani et al.
6687848 February 2004 Najmi
6687873 February 2004 Ballantyne et al.
6691106 February 2004 Sathyanarayan
6691154 February 2004 Zhu et al.
6691157 February 2004 Muir et al.
6704807 March 2004 Mathur et al.
6710893 March 2004 Hou et al.
6711593 March 2004 Gordon et al.
6711618 March 2004 Danner et al.
6717513 April 2004 Sandelman et al.
6738798 May 2004 Ploetz et al.
6754664 June 2004 Bush
6757714 June 2004 Hansen
6757899 June 2004 Zhdankin et al.
6763274 July 2004 Gilbert
6763501 July 2004 Zhu et al.
6766333 July 2004 Wu et al.
6775238 August 2004 Suzuki et al.
6779004 August 2004 Zintel
6782542 August 2004 Mein et al.
6785015 August 2004 Smith et al.
6785713 August 2004 Freeman et al.
6785726 August 2004 Freeman et al.
6789112 September 2004 Freeman et al.
6789119 September 2004 Zhu et al.
6792337 September 2004 Blackett et al.
6799209 September 2004 Hayton
6799270 September 2004 Bull et al.
RE38609 October 2004 Chen et al.
6804712 October 2004 Kracht
6807580 October 2004 Freeman et al.
6810488 October 2004 Teng
6816616 November 2004 Teng
6823397 November 2004 Rawson, III
6826606 November 2004 Freeman et al.
6831555 December 2004 Miller et al.
6832239 December 2004 Kraft et al.
6832373 December 2004 O'Neill
6834298 December 2004 Singer et al.
6842903 January 2005 Weschler
6857013 February 2005 Ramberg et al.
6886046 April 2005 Stutz et al.
6891830 May 2005 Curtis
6901448 May 2005 Zhu et al.
6904593 June 2005 Fong et al.
6920480 July 2005 Mitchell et al.
6922724 July 2005 Freeman et al.
6925335 August 2005 May et al.
6925645 August 2005 Zhu et al.
6928469 August 2005 Duursma et al.
6940405 September 2005 Script et al.
6950991 September 2005 Bloomfield et al.
6952714 October 2005 Peart
6963899 November 2005 Fernandez et al.
6972676 December 2005 Kimmel et al.
6983020 January 2006 Christiansen
6985779 January 2006 Hsiung et al.
6986040 January 2006 Kramer et al.
6990395 January 2006 Ransom et al.
7003574 February 2006 Bahl
7016966 March 2006 Saulpaugh et al.
7020706 March 2006 Cates et al.
7020773 March 2006 Otway et al.
7028025 April 2006 Collins
7028081 April 2006 Kawashima
7031342 April 2006 Teng
7032005 April 2006 Mathon et al.
7043677 May 2006 Li
7046134 May 2006 Hansen
7051084 May 2006 Hayton et al.
7057724 June 2006 Mead et al.
7065576 June 2006 Kamel et al.
7069298 June 2006 Zhu et al.
7072946 July 2006 Shafer
7079010 July 2006 Champlin
7080267 July 2006 Gary et al.
7082426 July 2006 Musgrove et al.
7082460 July 2006 Hansen et al.
7085814 August 2006 Gandhi et al.
7085824 August 2006 Forth et al.
7089567 August 2006 Girardot et al.
7091846 August 2006 Wu
7092370 August 2006 Jiang et al.
7099110 August 2006 Detzler
7100200 August 2006 Pope et al.
7103357 September 2006 Kirani et al.
7103799 September 2006 Dixon
7113988 September 2006 Chirashya et al.
7116681 October 2006 Hovell et al.
7117239 October 2006 Hansen
7117243 October 2006 Peart
7127525 October 2006 Coleman et al.
7130883 October 2006 Zhu et al.
7142839 November 2006 Pelaez et al.
7149792 December 2006 Hansen
7158483 January 2007 Takabatake et al.
7162315 January 2007 Gilbert
7162628 January 2007 Gentil et al.
7178149 February 2007 Hansen
7185014 February 2007 Hansen
7194743 March 2007 Hayton et al.
7203755 April 2007 Zhu et al.
7213051 May 2007 Zhu et al.
7216172 May 2007 Yang et al.
7234943 June 2007 Aleali
7254601 August 2007 Baller et al.
7266526 September 2007 Drummond et al.
7290061 October 2007 Lentini et al.
7293176 November 2007 Otway et al.
7330872 February 2008 Peart et al.
7334119 February 2008 Gentil et al.
7340772 March 2008 Panasyuk et al.
7346842 March 2008 Hayton et al.
7353253 April 2008 Zhao
7359953 April 2008 Muir et al.
7376695 May 2008 Duursma et al.
7421484 September 2008 Das
7444071 October 2008 Chen
7453379 November 2008 Plamondon
7460038 December 2008 Samuels et al.
7490166 February 2009 Yang et al.
7496097 February 2009 Rao et al.
7502726 March 2009 Panasyuk et al.
7502784 March 2009 Collins
7529767 May 2009 DeAnna et al.
7532134 May 2009 Samuels et al.
7542471 June 2009 Samuels et al.
7555529 June 2009 Bloomfield et al.
7562121 July 2009 Berisford
7562146 July 2009 Panasyuk et al.
7562226 July 2009 Aiken et al.
7565526 July 2009 Shaw et al.
7581005 August 2009 Montemayor et al.
7584294 September 2009 Plamondon
7587755 September 2009 Kramer
7593514 September 2009 Zhuang et al.
7594018 September 2009 Pedersen
7596593 September 2009 Mitchell et al.
7606902 October 2009 Rao et al.
7609721 October 2009 Rao et al.
7613131 November 2009 Decasper et al.
7617531 November 2009 Chauhan et al.
7619545 November 2009 Samuels et al.
7656799 February 2010 Samuels et al.
7657657 February 2010 Rao et al.
7661129 February 2010 Panasyuk et al.
7661131 February 2010 Shaw et al.
7664857 February 2010 Ovsiannikov et al.
7676813 March 2010 Bisset et al.
2001/0007117 July 2001 Cooper et al.
2001/0025377 September 2001 Hinderks
2001/0027439 October 2001 Holtzman et al.
2001/0049690 December 2001 McConnell et al.
2001/0049717 December 2001 Freeman et al.
2001/0052999 December 2001 Hiraoka et al.
2001/0056547 December 2001 Dixon
2002/0006790 January 2002 Blumenstock et al.
2002/0019844 February 2002 Kurowski et al.
2002/0026514 February 2002 Ellis et al.
2002/0032470 March 2002 Linberg
2002/0032720 March 2002 Nelson et al.
2002/0035533 March 2002 Mache et al.
2002/0038320 March 2002 Brook
2002/0052932 May 2002 Curtis et al.
2002/0054169 May 2002 Richardson
2002/0059489 May 2002 Davis et al.
2002/0064138 May 2002 Saito et al.
2002/0078135 June 2002 Venkatsubra
2002/0078259 June 2002 Wendorf et al.
2002/0080391 June 2002 Sugiura et al.
2002/0095600 July 2002 Deen
2002/0116550 August 2002 Hansen
2002/0133753 September 2002 Mayberry et al.
2002/0135801 September 2002 Tessman
2002/0138567 September 2002 Ogawa
2002/0144016 October 2002 Spicer et al.
2002/0157090 October 2002 Anton, Jr.
2002/0174085 November 2002 Nelson et al.
2002/0178241 November 2002 Eriksson
2002/0191612 December 2002 Curtis
2003/0014733 January 2003 Ringseth et al.
2003/0023957 January 2003 Bau et al.
2003/0025931 February 2003 Dorfman et al.
2003/0037148 February 2003 Pedersen
2003/0056140 March 2003 Taylor et al.
2003/0061403 March 2003 Miyata et al.
2003/0063119 April 2003 Bloomfield et al.
2003/0063309 April 2003 Parry
2003/0070006 April 2003 Nadler et al.
2003/0072027 April 2003 Haines et al.
2003/0081617 May 2003 Deng
2003/0088697 May 2003 Matsuhira
2003/0118353 June 2003 Baller
2003/0154284 August 2003 Bernardin et al.
2003/0158897 August 2003 Ben-Natan et al.
2003/0158919 August 2003 Fomenko
2003/0163569 August 2003 Panasyuk et al.
2003/0177172 September 2003 Duursma et al.
2003/0182375 September 2003 Zhu
2003/0200285 October 2003 Hansen et al.
2003/0200329 October 2003 Delaney
2003/0229529 December 2003 Mui et al.
2003/0229785 December 2003 Daseke et al.
2004/0027376 February 2004 Calder et al.
2004/0098515 May 2004 Rezvani et al.
2004/0128370 July 2004 Kortright
2004/0133692 July 2004 Blanchet et al.
2004/0138786 July 2004 Blackett et al.
2004/0139309 July 2004 Gentil et al.
2004/0152450 August 2004 Brasher et al.
2004/0158630 August 2004 Chang et al.
2004/0158631 August 2004 Chang et al.
2004/0177124 September 2004 Hansen
2004/0186693 September 2004 Xiang et al.
2004/0215605 October 2004 Mester
2004/0221026 November 2004 Dorland
2004/0252628 December 2004 Detzler
2004/0260801 December 2004 Li
2005/0005152 January 2005 Singh et al.
2005/0015501 January 2005 Kaplan et al.
2005/0033588 February 2005 Ruiz et al.
2005/0055397 March 2005 Zhu et al.
2005/0080897 April 2005 Braun et al.
2005/0086172 April 2005 Stefik
2005/0102388 May 2005 Tabbara et al.
2005/0141507 June 2005 Curtis
2005/0144612 June 2005 Wang et al.
2005/0154787 July 2005 Cochran et al.
2005/0190769 September 2005 Smith
2005/0193099 September 2005 Reus et al.
2005/0193386 September 2005 McCaleb et al.
2005/0196023 September 2005 Chen et al.
2005/0198189 September 2005 Robinson et al.
2005/0198245 September 2005 Burgess et al.
2005/0198292 September 2005 Duursma et al.
2005/0198379 September 2005 Panasyuk et al.
2005/0198380 September 2005 Panasyuk et al.
2005/0198393 September 2005 Stutz et al.
2005/0232168 October 2005 Schauser et al.
2005/0235014 October 2005 Schauser et al.
2005/0246445 November 2005 Panasyuk et al.
2005/0246702 November 2005 Yeh et al.
2005/0251551 November 2005 Mitchell et al.
2005/0256614 November 2005 Habermas
2005/0256923 November 2005 Adachi
2005/0262076 November 2005 Voskuil
2005/0267974 December 2005 Panasyuk et al.
2005/0273513 December 2005 Panasyuk et al.
2006/0002315 January 2006 Theurer et al.
2006/0015740 January 2006 Kramer
2006/0029062 February 2006 Rao et al.
2006/0029063 February 2006 Rao et al.
2006/0029064 February 2006 Rao et al.
2006/0031237 February 2006 DeAnna et al.
2006/0031476 February 2006 Mathes et al.
2006/0031779 February 2006 Theurer et al.
2006/0037022 February 2006 Byrd et al.
2006/0037071 February 2006 Rao et al.
2006/0037072 February 2006 Rao et al.
2006/0039354 February 2006 Rao et al.
2006/0039355 February 2006 Rao et al.
2006/0039356 February 2006 Rao et al.
2006/0039404 February 2006 Rao et al.
2006/0047956 March 2006 Calvin
2006/0059239 March 2006 Brasher et al.
2006/0066448 March 2006 Berisford et al.
2006/0069662 March 2006 Braddy et al.
2006/0069668 March 2006 Braddy et al.
2006/0069750 March 2006 Momtchilov et al.
2006/0069753 March 2006 Hu et al.
2006/0070029 March 2006 Laborczfalvi et al.
2006/0070090 March 2006 Gulkis
2006/0070131 March 2006 Braddy et al.
2006/0074837 April 2006 Braddy et al.
2006/0075080 April 2006 Burr et al.
2006/0075114 April 2006 Panasyuk et al.
2006/0075123 April 2006 Burr et al.
2006/0075381 April 2006 Laborczfalvi et al.
2006/0075463 April 2006 Braddy et al.
2006/0077941 April 2006 Alagappan et al.
2006/0087408 April 2006 Korzeniowski
2006/0087409 April 2006 Korzeniowski
2006/0090171 April 2006 Laborczfalvi et al.
2006/0095334 May 2006 Simmons
2006/0095370 May 2006 Seth et al.
2006/0100972 May 2006 Chianese et al.
2006/0135192 June 2006 Surendra et al.
2006/0150249 July 2006 Gassen et al.
2006/0159080 July 2006 Mazzaferri et al.
2006/0159432 July 2006 Mazzaferri et al.
2006/0161555 July 2006 Mazzaferri et al.
2006/0161671 July 2006 Ryman et al.
2006/0161783 July 2006 Aiken et al.
2006/0161959 July 2006 Ryman et al.
2006/0161974 July 2006 Innes et al.
2006/0179143 August 2006 Walker et al.
2006/0184614 August 2006 Baratto et al.
2006/0190719 August 2006 Rao et al.
2006/0200307 September 2006 Riess
2006/0200494 September 2006 Sparks
2006/0203007 September 2006 Bullard et al.
2006/0206820 September 2006 Bullard et al.
2006/0224742 October 2006 Shabazi et al.
2006/0236325 October 2006 Rao et al.
2006/0236385 October 2006 Innes et al.
2006/0242415 October 2006 Gaylor
2006/0247502 November 2006 Chen
2006/0248144 November 2006 Zhu
2006/0271875 November 2006 Green et al.
2006/0271877 November 2006 Theurer et al.
2006/0282521 December 2006 Anderson et al.
2007/0005736 January 2007 Hansen et al.
2007/0011295 January 2007 Hansen
2007/0011356 January 2007 Schauser et al.
2007/0022159 January 2007 Zhu
2007/0056009 March 2007 Spilo et al.
2007/0078976 April 2007 Taylor et al.
2007/0088826 April 2007 Raphel et al.
2007/0094076 April 2007 Perkowski et al.
2007/0094672 April 2007 Hayton et al.
2007/0100892 May 2007 Kephart et al.
2007/0106810 May 2007 Ryman
2007/0106811 May 2007 Ryman
2007/0113069 May 2007 Gentil et al.
2007/0130167 June 2007 Day et al.
2007/0130337 June 2007 Arnison
2007/0143837 June 2007 Azeez et al.
2007/0150903 June 2007 Hansen
2007/0156810 July 2007 Kumar
2007/0156923 July 2007 Kumar
2007/0157101 July 2007 Indiran et al.
2007/0171921 July 2007 Wookey et al.
2007/0174410 July 2007 Croft et al.
2007/0174429 July 2007 Mazzaferri et al.
2007/0174454 July 2007 Mitchell et al.
2007/0179955 August 2007 Croft et al.
2007/0180447 August 2007 Mazzaferri et al.
2007/0180448 August 2007 Low et al.
2007/0180449 August 2007 Croft et al.
2007/0180450 August 2007 Croft et al.
2007/0180493 August 2007 Croft et al.
2007/0186212 August 2007 Mazzaferri et al.
2007/0192329 August 2007 Croft et al.
2007/0198656 August 2007 Mazzaferri et al.
2007/0198661 August 2007 Hansen
2007/0203952 August 2007 Baron et al.
2007/0239886 October 2007 Montemayor et al.
2007/0271599 November 2007 Rosenstein
2007/0282623 December 2007 Dattorro
2007/0288629 December 2007 Taylor et al.
2007/0294237 December 2007 John et al.
2008/0005321 January 2008 Ma et al.
2008/0031235 February 2008 Harris et al.
2008/0034057 February 2008 Kumar et al.
2008/0034072 February 2008 He et al.
2008/0034110 February 2008 Suganthi et al.
2008/0034111 February 2008 Kamath et al.
2008/0034119 February 2008 Verzunov et al.
2008/0034410 February 2008 Udupa et al.
2008/0034413 February 2008 He et al.
2008/0034418 February 2008 Venkatraman et al.
2008/0034419 February 2008 Mullick et al.
2008/0043617 February 2008 Schekochikhin et al.
2008/0043622 February 2008 Kamath et al.
2008/0043749 February 2008 Suganthi et al.
2008/0043760 February 2008 Venkatraman et al.
2008/0043761 February 2008 Kumar et al.
2008/0046371 February 2008 He et al.
2008/0046616 February 2008 Verzunov et al.
2008/0046714 February 2008 Suganthi et al.
2008/0046717 February 2008 Kanekar et al.
2008/0046727 February 2008 Kanekar et al.
2008/0046994 February 2008 Venkatraman et al.
2008/0049616 February 2008 Kamath et al.
2008/0065757 March 2008 Motoyama et al.
2008/0068289 March 2008 Piasecki
2008/0068290 March 2008 Muklashy et al.
2008/0069005 March 2008 von Eicken et al.
2008/0069104 March 2008 von Eicken et al.
2008/0071905 March 2008 Sullivan et al.
2008/0082657 April 2008 Hart et al.
2008/0109912 May 2008 Rivera
2008/0126978 May 2008 Bai et al.
2008/0154957 June 2008 Taylor et al.
2008/0201405 August 2008 Duursma et al.
2008/0208605 August 2008 Sinha et al.
2008/0219122 September 2008 Detzler et al.
2008/0231414 September 2008 Canosa
2008/0250110 October 2008 Zhao
2009/0013064 January 2009 Taylor et al.
2009/0019226 January 2009 Edwards et al.
2009/0055745 February 2009 Christiansen
2009/0064134 March 2009 Cox
2009/0099836 April 2009 Jacobsen et al.
2009/0100349 April 2009 Hancock
2009/0106347 April 2009 Harwood et al.
2009/0117890 May 2009 Jacobsen et al.
2009/0119408 May 2009 Teze et al.
2009/0187654 July 2009 Raja et al.
2009/0234972 September 2009 Raghu et al.
2009/0259728 October 2009 Berisford et al.
Foreign Patent Documents
0874306 Oct 1998 EP
1 191 744 Mar 2002 EP
1 362 282 Nov 2003 EP
1 695 485 Aug 2006 EP
2797728 Feb 2001 FR
2305820 Apr 1997 GB
60-263162 Dec 1985 JP
60-263163 Dec 1985 JP
06-062130 Mar 1994 JP
07-325513 Dec 1995 JP
09-163008 Jun 1997 JP
09-305407 Nov 1997 JP
09-325925 Dec 1997 JP
10-190922 Jul 1998 JP
10-224372 Aug 1998 JP
11-203079 Jul 1999 JP
11-296453 Oct 1999 JP
2000-112863 Apr 2000 JP
2000-122952 Apr 2000 JP
2000-278773 Oct 2000 JP
2000-309145 Nov 2000 JP
2001-337817 Dec 2001 JP
2003-223603 Aug 2003 JP
WO97/30879 Aug 1997 WO
WO98/20439 May 1998 WO
WO98/33302 Jul 1998 WO
WO98/38910 Sep 1998 WO
WO98/41943 Sep 1998 WO
WO99/21336 Apr 1999 WO
WO99/57649 Nov 1999 WO
WO 99/57837 Nov 1999 WO
WO99/57838 Nov 1999 WO
WO99/64958 Dec 1999 WO
WO00/23894 Apr 2000 WO
WO 02/10919 Feb 2002 WO
WO02/21239 Mar 2002 WO
WO02/21299 Mar 2002 WO
WO02/21414 Mar 2002 WO
WO02/21415 Mar 2002 WO
WO02/21777 Mar 2002 WO
WO02/25501 Mar 2002 WO
WO03/021464 Mar 2003 WO
WO03/054439 Jul 2003 WO
WO2004/059447 Jul 2004 WO
WO2006/009402 Jan 2006 WO
WO2008/083177 Jul 2008 WO

Other References

"Frequently Asked Questions about the Extensible Markup Language--The XML FAQ" Version 1.41 (http://www.oasis-open.org/cover/xmlFAQ141-19981006.html) (Oct. 6, 1998). cited by other .
24.times.7, HealthTech Publishing Company, Inc. (Nov. 1996). cited by other .
"Remote Diagnostics: Strategic weapon in the war for multi-vendor service contracts," Tech Assessment, vol. 3, No. 12, Dec. 1995. cited by other .
"Siemens Medical, BJC Health System Extend deal to multivendor service," Medical Imaging News, vol. 6, No. 26, Jun. 27, 1997. cited by other .
Dec. 27, 1995, SCAN Diagnostic Imaging, vol. 8, No. 24. cited by other .
Apr. 22, 2005 Literature Search by Keyword: CyberTAC. cited by other .
Adelberg, D., "Building Robust Wrappers for Text Sources", [online] Retrieved from the Internet:<URL:http://student.bu.ac.bd/.about.mumit/Research/NLP-bib/pa- pers/Adelberg99.pdf> [retrieved on Nov. 24, 2008] (1999). cited by other .
Allegro Software product release 1-61 overview Greenhills Software Inc., [online] Jun. 10, 2002, pp. I-I, XPOO2201939 Retrieved from the Internet: <URL: http://www.ghs.com/partners/allegro/> [retrieved on Jun. 10, 2002] the whole document. cited by other .
Allegro, RomWebCLient Embedded HTTP client Toolkit: Allegrosoft, Circuit Cellar Online, Sep. 7, 2000, pp. 1-2, XP-002201983, URL:http://web.archive.orgweb/20000709204234/http://www.allegrosoft.com/r- omwebclient.html. cited by other .
Box, et al., Simple Object Acces Protocol (SOAP) 1.1, Document No. XP002250270, May 8, 2000. cited by other .
Cheung, D. et al., "Distributed and Scalable XML Document Processing Architecture for E-Commerce Systems", Adv. Issues of E-Commerce and Web-Based Information Systems, WECWIS 2000, 2nd Int'l Workshop, (Jun. 2000), pp. 152-157. cited by other .
Ennis, D., "CORBA and XML Integration in Enterprise Systems", IONA Technologies Inc.[online], Retrieved from the Internet:<URL:http://citeseer.ist.psu.edu/cache/papers/cs/16013/http:z- SzzSzwww.iona.comzSzinfozSztechcenterzSzecoop2000apr17.pdf/ennis00corba. cited by other .
CyberTAC & RadScape Presentation (May 1997). cited by other .
CyberTAC Design Presentation (1997). cited by other .
CyberTAC from Virtual Impact Systems, Inc. Presentation (1997). cited by other .
CyberTAC Remote Support System Presentation (1997). cited by other .
Database WIP, Section EI, Week 200156, Abstract, Document No. XP002253876 (Korea Electronics & Telecom Res Inst.) Derwent Publications, Ltd., London, GB, (Mar. 2001). cited by other .
Eastvold, Roger, "Tiss and Tell," Medical Imaging, Sep. 1995. cited by other .
Jiang, et al., "Record-Boundary Discovery in Web Documents", [online] Retrieved from the Internet:<URL:http://osm7.cs.byu.edu/deg/papers/SJ.Thesis.ps>, [retrieved on Nov. 24, 2008] (1998). cited by other .
Emmerich et al., Implementing Incremental Code Migration with XML, IEEE, 4-11, (Jun. 2000). cited by other .
EmWare Press Release: "emWare Announces Support for Sun Microsystems Jini Technology," Salt Lake City, UT (Feb. 1999). cited by other .
EmWare Press Release: "emWare, IBM Demonstrate Next Phase in Establishing Worldwide Access to Embedded Devices," Chicago, IL (Mar. 1999). cited by other .
EmWare Press Release: "emWare's emLink (TM) Used to Internet-enable Welch Allyn's Vital Signs Monitor," Chicago, IL (Mar. 1999). cited by other .
EmWare Press Release: "Invensys Selects emWare EMIT Device-Networking Software to Add Remote Monitoring and Control Capabilities to its Controller Products," Salt Lake City, UT (Jun. 1999). cited by other .
EmWare Press Release: "Motorola, Mitsubishi and National Semiconductor Join emWare's Embed The Internet Alliance," Chicago, IL (Mar. 1999). cited by other .
Hanckmann, J., "Telescript: The Emerging Standard for Intelligent Messaging," Philips Telecommunications Review, vol. 52(1), pp. 15-19 (Mar. 1994). cited by other .
Incremona, A. "Remote Service Diagnostics for Imaging Equipment: Today and Tomorrow," Advanced Imaging, 12(9):90(2) (1997). cited by other .
Jennyc, Kenn S., "Linking Enterprise Business Systems to the Factory Floor," The Hewlett-Packard Journal, Article 9 (May 1998). cited by other .
Kimball, R., "XML Will Make it Easier," Intelligent Enterprise, [online] Retrieved from the Internet:<URL:http://www.intelligententerprise.com/010416/webhouse1.su- b.--1.jhtml> [retrieved on Nov. 24, 2008] (Apr. 16, 2001). cited by other .
Koppen, E., et al., "Active Hypertext for Distributed Web Applications", Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE '99), Proc. IEEE 8th Int'l Workshop (1999), pp. 297-302. cited by other .
Kovar, J., "Xerox Unveils Expanded Channel Lineup; Also Plans to Introduce E-Mail, Queue Management Software," PC Expo,(Jun. 1999). cited by other .
Lassman, M. et al., "Modern Nuclear Medical Diagnostics with Efficient Gamma Cameras," Electromedica, 66(2):43-51, (1998). cited by other .
Layman, et al. "XML-Data," Position Paper from Microsoft Corp. (Jun. 1997), [online] Retrieved from the Internet:<URL:http://www.oasis-open.org/cover/xml-data9706223.html> [retrieved on Sep. 2, 2004]. cited by other .
Lerner, R., "At the Forge: Introducing SOAP", Linux Journal, #XP002292162 (Mar. 2001). cited by other .
Lindley, D., "Xerox unveils copier that phones for help," Rochester Democrat and Chronicle, (Mar. 28, 1990). cited by other .
Luh, James C., "With several specs complete, XML enters widespread development," Internet World, (Jan. 4, 1999). cited by other .
Math Markup Language (Chapter 4); [online] Retrieved from the Internet:<URL:http://www.w3.org/TR/REC-MathML/chap4.sub.--4.html>, [retrieved on Feb. 15, 2005]. cited by other .
McBride, R.A., "Security Considerations for Active Messages," ACM SIGICE Bulletin, vol. 22 (2), (Oct. 1996). cited by other .
Memphis Educational Computer Connectivity Alliance (MECCA), [online] Retrieved from the Internet:<URL:http://www.mecca.org/.about.Itague/nsfnocostextension.ht- ml>, [retrieved on Feb. 15, 2005]. cited by other .
Orasis Medical Services, Inc., Business Plan Copy No. 001, (Nov. 1995). cited by other .
Pfeiffer, R., "XML Tutorials for Programmers: Tutorial 2: Writing XML Documents," (1999) [online] Retrieved from the Internet:<URL:http://imb.com/xml>, [retrieved on Mar. 2, 1999]. cited by other .
Questra Preliminary Invalidity Contentions, dated Apr. 29, 2005. cited by other .
Reagan, K., "Technology for the Soul," OC Metro, (Sep. 1, 1995). cited by other .
Rytting, T., "Dispensing the Goods, Embedded Style," Circuit Cellar Online, (Oct. 1999). cited by other .
Schmidt, The Evolution of Workflow Standards, IEEE (1999). cited by other .
SOAP Archives Online, "Multiple Method Calls in SOAP Packet"; [online] Retrieved from the Internet:<URL:http://discuss.develop.com/archives/wa.exe?A2=ind9912&L=- soap&T=O&F=&S=&P=25113>, [retrieved on Dec. 8, 2000]. cited by other .
Steinfeld, E., "From Standalone to Internet Appliance", Circuit Cellar Online, [online] (Jul. 9, 2000), #XP002201938, Retrieved from the Internet: <URL:http://web.archive.org/web/2000070920 4234/http://www.alegrosoft.com/romwebclient.html>retrieved on 2002. cited by other .
Steinfeld, E., "Internet-appliance technology automates test equipment" EDN Magazine, pp. 157-169, Oct. 2000, www.edbmag.com. cited by other .
Suresh et al., "XML-based Data System for Earth Science Applications", IEEE 2000 International, vol. 3, pp. 242-28, Jul. 2000. cited by other .
Searls, "The Next Bang: The Expolosive Combination of Embedded Linux, XML, and Instant Mess.", ACM (Sep. 2000) Issue 77 [online] Retrieved from the Internet:<URL:http://www.linuxjournal.com/article.php?sid=4195>, [retrieved on Nov. 20, 2001]. cited by other .
The Simple Times, vol. 7, No. 1, Mar. 1999; [online] Retrieved from the Internet:<URL:http://www.simple-times.org/pub/simple-times/issues/7-1.- html> [retrieved on Aug. 3, 2005]. cited by other .
Trewitt, G., "Using Tcl to Process HTMS Forms," Digital Network Systems Laboratory, NSL Technical Note TN-14, Palo Alto, CA (Mar. 1994). cited by other .
Virtual Reality Transfer Protocol (VRTP); Retrieved from the Internet:<URL:http://www.stl.nps.navy.mil/.about.brutzman/vrtp> (1998). cited by other .
Walsh, Norman, "XSL The Extensible Style Language: Styling XML Documents," New Architect Daily, Jan. 1999. cited by other .
webmethods B2B Whitepaper; [online] Retrieved from the Internet:<URL:http://www.cs.wisc.edu/.about.vganti/papers/b2b.sub.--wp- B2Bintegration.html> (1999). cited by other .
Wigget, Jeremy, "Intraview: Roger Eastvold of Orasis Inc.," 24.times.7, Nov. 1996. cited by other .
Williams, T., "Java Goes To Work Controlling Networked Embedded Systems" Computer Design, Pennwell Publ. Littleton, MA, 35:9:36-37, Aug. 1996. cited by other .
Winer, Dave, "XML-RPC Specification," (http://XML-RPC.com), Jun. 15, 1999. cited by other .
Wu et al., "A knowledge sharing and collaboration system model based on Internet", Systems, Man, and Cybernetics, 1999. IEEE SMC'99 Conference Proceedings, vol. 2, pp. 148-152 (1999). cited by other .
Xerox 190 Copier, Electronic Data Interface Operator Guide, ver. 1.0, (1989). cited by other .
International Search Report in Application No. PCT/US01/23651, dated Jun. 3, 2002. cited by other .
International Search Report in Application No. PCT/US01/29787, dated Jun. 28, 2002. cited by other .
International Preliminary Examination Report in Application No. PCT/US01/29787, dated Aug. 21, 2002. cited by other .
International Preliminary Examination Report in Application No. PCT/US01/23651, dated Oct. 10, 2002. cited by other .
International Search Report in Application No. PCT/US01/45198, dated Apr. 29, 2003. cited by other .
International Search Report and Written Opinion in Application No. PCT/US03/11701, dated Oct. 13, 2004. cited by other .
International Preliminary Examination Report in Application No. PCT/US01/45198, dated Apr. 2, 2008. cited by other .
Bock, G., "Mainstreaming XML-based Enterprise Applications: Using Oracle XML DB to Manage Financial Information within a Global Banking System", Oracle Corporation, (C) 2003. cited by other .
Chandler, T. et al., "The Technology Development of Automatic Metering and Monitoring Systems", Int'l Power Engineering Conf. 2005, IEEE, 4 pgs. cited by other .
EmWare Press Release: "emWare Delivers EMIT 3.0 SDK Pro-A Complete Device Networking Kit for Developing End-to-end, Embedded Device Networking Solutions," Salt Lake City, UT (May 1999). cited by other .
Franklin, M. et al., "Data in Your Face: PUSH Technology in Perspective", Proc. ACM Sigmod Int'l Conf. On Mgmt of Data, (Jun. 1998), #XP000886180, pp. 516-519. cited by other .
Universal Plug & Play Device Architecture, (C) Microsoft Corporation (Jun. 8, 2000), [online] Retrieved from the Internet: <URL:http://www.upnp.org/specs/arch/upnpda10.sub.--20000613.htm>, [retrieved on Nov. 24, 2008]. cited by other .
Kafeza, E. et al., "Alerts in Mobile Healthcare Applications: Requirements and Pilot Study", IEEE, vol. 8, No. 2, pp. 173-181 (Jun. 2004). cited by other .
Lewandowska, J., et al., "System for Grouping Technologically Similar Devices", v. 48 n 12; (Dec. 1975), pp. 636-638 (English Abstract). cited by other .
Martin, D., "Protessional XML"., WROX Press Ltd., pub., Ch. 11, `Server to Server`, pp. 559-562, 819-820 (2000). cited by other .
Mason, K., "XML Translation for block structured languages", IBM Corporation: Research Disclosure, Kenneth Mason Publications, 44176 (2001). cited by other .
Mills et al., "A knowledge-based method for inferring semantic concepts from visual models of system behavior," ACM (Jul. 2000), pp. 306-337. cited by other .
Questra Applications Data Sheet (2002). cited by other .
White Paper, Medical Imaging, East Providence, RI (Sep. 1995). cited by other .
Winter 1992, Field of View, vol. 2, No. 3, Toshiba America Medical System, Inc. cited by other .
Van der Werff, M., et al., "A Mobile-Based Home Automatic System", IEEE Mobility Conference 2005 (pages? On CD?) 3/17. cited by other .
Examination Report in EP Application No. 01955993.9, dated Jan. 29, 2004. cited by other .
Examination Report in EP Application No. 01955993.9, dated Aug. 5, 2004. cited by other .
Examination Report in EP Application No. 01955993.9, dated Dec. 16, 2004. cited by other .
Examination Report in EP Application No. 01973431.8, dated Mar. 8, 2005. cited by other .
Communication in EP Application No. 01973431.8, dated Mar. 30, 2005. cited by other .
Examination Report in EP Application No. 01973431.8, dated Jan. 15, 2008. cited by other .
Office Action in EP Application No. 01996048.3, dated Jun. 22, 2004. cited by other .
Office Action in EP Application No. 01996048.3, dated Mar. 11, 2005. cited by other .
Office Action in EP Application No. 01955993.9, dated Jun. 6, 2005. cited by other .
Examination Report in EP Application No. 03719774.6, dated Sep. 12, 2005. cited by other .
Examination Report in EP Application No. 03719774.6, dated Apr. 12, 2006. cited by other .
Examination Report in EP Application No. 01973431.8, dated Feb. 6, 2009. cited by other .
International Search Report in Application No. PCT/US03/11707, dated Sep. 24, 2003. cited by other .
Written Opinion in Application No. PCT/US01/45198, dated May 31, 2007. cited by other .
International Preliminary Report on Patentability in Application No. PCT/US2007/088858, dated Jul. 9, 2009. cited by other .
Application and Response History in Application No. 09/627,201 as retrieved from PAIR, through Apr. 22, 2009. cited by other .
Application and Response History in Application No. 10/805,012 as retrieved from PAIR, through Apr. 22, 2009. cited by other .
Action and Response History in Application No. 09/667,737 as retrieved from PAIR, through Apr. 22, 2009. cited by other .
Application and Response History in Application No. 11/677,279, as retrieved from PAIR, through Aug. 19, 2009. cited by other .
Application and Response History in Application No. 09/716,717, as retrieved from PAIR, through May 1, 2007. cited by other .
Action and Response History in Application No. 09/708,384 as retrieved from PAIR, through Apr. 22, 2009. cited by other .
Action and Response History in Application No. 11/503,638 as retrieved from PAIR, through May 28, 2009. cited by other .
Action and Response History in Application No. 10/123,960, as retrieved from PAIR, through Apr. 22, 2009. cited by other .
Action and Response History in Application No. 10/124,181, as retrieved from PAIR on Apr. 22, 2009. cited by other .
Action and Response History in Application No. 10/028,126 as retrieved from PAIR, through Feb. 19, 2009. cited by other .
Action and Response History in Application No. 11/537,399 as retrieved from PAIR, through May 28, 2009. cited by other .
Action and Response History in Application No. 11/538,402 as retrieved from PAIR, through Jul. 7, 2009. cited by other .
Summons to attend oral proceedings in corresponding European Application No. 01955993.9 dated Oct. 31, 2005. cited by other .
Result of Consultation of Nov. 24, 2005 and Nov. 25, 2005 from corresponding European Application No. 01955993. cited by other .
Submission in German dated Nov. 25, 2005 from corresponding European Application No. 01955993.9. cited by other .
Annex to EPO Form 2004 with claims for grant in European Application No. 01955993.9. cited by other .
Oral Proceeding Minutes with European Application No. 01955993.9. cited by other .
Communication dated Apr. 26, 2005 in European Application No. 01955993.9. cited by other .
Action and Response History in Application No. 11/774,474 as retrieved from PAIR, through Sep. 22, 2009. cited by other .
Application and Response History in Application No. 11/677,279, as retrieved from PAIR on Nov. 13, 2009. cited by other .
Action and Response History in Application No. 11/503,638 as retrieved from PAIR on Nov. 13, 2009. cited by other .
Action and Response History in Application No. 10/124,181, as retrieved from PAIR on Nov. 13, 2009. cited by other .
Action and Response History in Application No. 11/537,399 as retrieved from PAIR, through Nov. 13, 2009. cited by other .
Action and Response History in Application No. 11/538,402 as retrieved from PAIR, through Nov. 13, 2009. cited by other .
Search Report in EP Application No. 02792391.1, dated Nov. 19, 2009. cited by other .
International Search Report in Application No. PCT/US2002/040058, dated Nov. 3, 2003. cited by other .
International Preliminary Examination Report in Application No. PCT/US2002/040058, dated Jun. 10, 2004. cited by other .
Defense Information Systems Agency, Field Services Office, White Paper Report "pcAnywhere 10.5" (Sep. 2003). cited by other .
Action and Response History in U.S. Appl. No. 11/677,279, as retrieved on Mar. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/503,638 as retrieved on Mar. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 10/124,181, as retrieved on Mar. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/537,399 as retrieved, through Mar. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/538,402 as retrieved, through Mar. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/774,474 as retrieved, through Mar. 16, 2010. cited by other .
Wikipedia, "GoToMyPC", [online] Retrieved from the Internet<URL: http://en.wikipedia.org/wiki/Gotomypc> [retrieved on Jan. 21, 2010] (2010). cited by other .
Citrix Online, Citrix Systems, Inc. Whilte Paper, "GoToMyPC Security", [online] Retrieved from the Internet<URL:http://www.citrix.it/Repository/docRepository/id.sub.--97- 9.sub.--1124821417888736.pdf> [retrieved on Mar. 16, 2010] (2004). cited by other .
Citrix Online, Citrix Systems, Inc. Whilte Paper, "GoToMyPC Corporate Technology", [online] Retrieved from the Internet: <URL:http://www.gotomypc.com/downloads/pdf/m/GoToMyPC.sub.--Corporate.- sub.--Technology.sub.--White.sub.--Paper.pdf> [retrieved on Mar. 16, 2010] (2004). cited by other .
ExpertCity, Inc., Whilte Paper, "GoToMyPC: Making Life Simpler for Teleworkers and Travelers", [online] Retrieved from the Internet: <URL:http://www.si.umich.edu/Classes/540/Placement/GoOvrvew.pdf> [retrieved on Mar. 16, 2010] (2001). cited by other .
Examination Report in EP Application No. 01973431.8, dated Mar. 23, 2010. cited by other .
Examination Report in EP Application No. 02792391.1, dated Mar. 10, 2010. cited by other .
International Search Report &. Written Opinion in Application No. PCT/US99/13068 dated Aug. 17, 1999. cited by other .
Action and Response History in U.S. Appl. No. 11/677,279, as retrieved on Jul. 6, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/503,638 as retrieved on Jul. 19, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/673,943 as retrieved on Apr. 26, 2010. cited by other .
Action and Response History in U.S. Appl. No. 10/124,181, as retrieved on Jul. 6, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/537,399 as retrieved, through Aug. 11, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/616,136 as retrieved, through Apr. 26, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/774,474 as retrieved, through Apr. 26, 2010. cited by other .
Response to Examination Report in EP Application No. 01973431.8, dated Oct. 4, 2010. cited by other .
Letter from Foreign Associate regarding response filed in EP Application No. 01973431.8, dated Oct. 8, 2010. cited by other .
English translation of Notification of Reasons for Refusal in Japanese Application No. 2002-529431, dated Nov. 8, 2010. cited by other .
Machine Translation of Japanese Patent Publication No. 09-305407 (Pub Date Nov. 1997). cited by other .
Machine Translation of Japanese Patent Publication No. 11-296453, (Pub Date Oct. 1999). cited by other .
Machine Translation of Japanese Patent Publication No. 11-203079, (Pub Date Jul. 1999). cited by other .
Machine Translation of Japanese Patent Publication No. 2000-309145, (Pub Date Nov. 2000). cited by other .
Machine Translation of Japanese Patent Publication No. 2001-337817, (Pub Date Dec. 2001). cited by other .
Action and Response History in U.S. Appl. No. 11/677,279, as retrieved on Nov. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/673,943 as retrieved on Sep. 28, 2010. cited by other .
Action and Response History in U.S. Appl. No. 10/124,181, as retrieved on Sep. 28, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/538,402 as retrieved, through Sep. 28, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/616,136 as retrieved, through Nov. 16, 2010. cited by other .
Action and Response History in U.S. Appl. No. 11/774,474 as retrieved, through Nov. 16, 2010. cited by other .
Summons to attend Oral Proceedings in EP Application No. 01973431.8, dated Feb. 2, 2011. cited by other.

Primary Examiner: Bates; Kevin
Assistant Examiner: Nguyen; Minh-Chau
Attorney, Agent or Firm: Fish & Richardson P.C.

Parent Case Text



CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Provisional Application No. 60/449,213, filed on Feb. 21, 2003, the contents of which are incorporated herein by reference.
Claims



What is claimed is:

1. A method, performed by at least one device, for transferring data via a communication session between a client application and a server application, the method comprising: assigning an identifier to the communication session; creating at least one queue associated with the communication session; storing data passed between the client application and the server application in the at least one queue, the data being stored using the identifier; and receiving, from the client application, a command to obtain data in the at least one queue that is destined for the client application and that is present at a time the command from the client application is received, and receiving, from the server application, a command to obtain data in the at least one queue that is destined for the server application and that is present at a time the command from the server application is received, the command received from the client application being a hypertext transfer protocol (HTTP) command to retrieve data from the at least one device, and the command received from the server application being an HTTP command to retrieve data from the at least one device; wherein the client application and the server application run local protocols, and the data is passed between the client application and the server application via an intermediary protocol; and wherein the client application is behind a first firewall, the server application is behind a second firewall, and the at least one device is not behind either the first firewall or the second firewall.

2. The method of claim 1, wherein the client application and the server application are on networks that run the local protocols, and wherein conversion between the local protocols and the intermediary protocol occurs prior to passing the data through the device.

3. The method of claim 2, wherein the local protocols comprise at least one of TCP/IP and a serial protocol, the serial protocol comprising one of RS232 and RS485.

4. The method of claim 1, further comprising: creating a socket interface to at least one of the client application and the server application, data from the at least one device being transmitted through the socket interface.

5. The method of claim 1, wherein the identifier is associated with the at least one queue.

6. The method of claim 1, wherein the at least one device comprises a server, and the method further comprises: performing load balancing to select the server to perform the method from among plural servers.

7. The method of claim 1, wherein the identifier is invalidated when the communication session terminates.

8. The method of claim 1, wherein the communication session comprises a telnet session.

9. The method of claim 1, wherein the communication session is effected via a Web site.

10. The method of claim 1, further comprising maintaining a session record, the session record including an identity associated with initiation of the session.

11. The method of claim 1, wherein the intermediary protocol is different from the local protocols.

12. The method of claim 1, wherein the intermediary protocol is a same protocol as the local protocols.

13. A machine-readable medium stores instructions for use in transferring data via a communication session between a client application and a server application the instructions being executable by at least one machine, the instructions for causing the at least one machine to: assign an identifier to the communication session; create at least one queue associated with the communication session; store data passed between the client application and the server application in the at least one queue, the data being stored using the identifier; and receive, from the client application, a command to obtain data in the at least one queue that is destined for the client application and that is present at a time the command from the server application is received, and receive, from the server application, a command to obtain data in the at least one queue that is destined for the server application and that is present at a time the command from the server application is received, the command received from the client application being a hypertext transfer protocol (HTTP) command to retrieve data from the at least one machine, and the command received from the server application being an HTTP command to retrieve data from the at least one machine; wherein the client application and the server application run local protocols, and the data is passed between the client application and the server application via an intermediary protocol; and wherein the client application is behind a first firewall, the server application is behind a second firewall, and the at least one machine is not behind either the first firewall or the second firewall.

14. The machine-readable medium of claim 13, wherein the client application and the server application are on networks that run the local protocols, and wherein conversion between the local protocols and the intermediary protocol occurs prior to passing the data through the at least one machine.

15. The machine-readable medium of claim 14, wherein the local protocols comprise at least one of TCP/IP and a serial protocol, the serial protocol comprising one of RS232 and RS485.

16. The machine-readable medium of claim 13, wherein the intermediary protocol is different from the local protocols.

17. The machine-readable medium of claim 13, wherein the intermediary protocol is a same protocol as the local protocols.

18. The machine-readable medium of claim 13, further comprising instructions to: create a socket interface to at least one of the client application and the server application, data from the at least one machine being transmitted through the socket interface.

19. The machine-readable medium of claim 13, wherein the identifier is associated with the at least one queue.

20. The machine-readable medium of claim 13, wherein the at least one machine comprises a server, and the machine-readable medium further comprises instructions to: perform load balancing to select the server.

21. A system for transferring data via a communication session between a client application and a server application, the client application running on a first network and the server application running on a second network, the system comprising: a proxy having a socket to the client application, the proxy to convert data between a local protocol run on the first network to a non-local protocol; an agent having a socket to the server application, the agent to convert data between a local protocol run on the second network and the non-local protocol; and a server to enable communication between the proxy and the agent, the server containing a message queue dedicated to the communication session, the message queue for storing data transmitted during the communication session, wherein the server is configured to receive, from the client application, data in the message queue destined for the server application, and to receive, from the server application, data in the message queue destined for the client application; wherein the server is configured to receive, from the client application, a command to obtain data in the message queue that is destined for the client application and that is present at a time the command from the client application is received, and to receive, from the server application, a command to obtain data in the message queue that is destined for the server application and that is present at a time the command from the server application is received, the command received from the client application being a hypertext transfer protocol (HTTP) command to retrieve data from the server, and the command received from the server application being an HTTP command to retrieve data from the server; and wherein the client application and the first network are behind a first firewall, the server application and the second network are behind a second firewall, and the server is not behind either the first firewall or the second firewall.

22. The system of claim 21, wherein, the proxy obtains the data from the message queue and passes the data to the client application.

23. The system of claim 21, wherein, the agent obtains the data from the message queue and passes the data to the server application.
Description



BACKGROUND

Many products, both hardware and software, have diagnostic tools or applications for communicating with them. When such products are located at customer sites, there is no way to use these tools except to send a service technician on-site to diagnose and repair any problems.

Tunneling solutions exist that provide a diagnostic program with access to a remote application. However, such tunneling solutions require a server at each site to provide access to applications behind its firewall. Since the additional server requires additional administration and maintenance at each site, it is an additional burden to end-users or customers.

Furthermore, and perhaps more significantly, installing a server at each site that provides tunnel access to a local network also has security risks. For example, such a server is addressable via the Internet, and thus is a target to break into an otherwise secure network.

SUMMARY

In general, in one aspect, the invention is directed to a method of transferring data via a communication session between a client application and a server application. The method includes assigning an identifier to the communication session, creating at least one queue associated with the communication session, and using the identifier to store data passed between the client application and the server application in the at least one queue. The client application and the server application run local protocols, and the data is passed between the client application and the server application via an intermediary protocol. The intermediary protocol may be different from the local protocols or it may be the same protocol as the local protocols. This aspect may include one or more of the following.

A socket interface may be created to at least one of the client application and the server application. The data may be transmitted through the socket interface. The client application and the server application may be on networks that run the local protocols, and the method may include converting between the local protocols and the intermediary protocol when passing the data.

The local protocol may be TCP/IP or a serial protocol, such as RS232 and RS485. The intermediary protocol may be HTTP. The method may be performed by a server, and may also include performing load balancing to select the server from among plural servers. The identifier may be associated with the at least one queue, and may be invalidated when the communication session terminates.

The communication session may be a telnet session or may be effected via a Web site. A session record may be maintained, which includes an identity of a user initiating the session along with other information.

The method may be implemented via machine-executable instructions stored on a readable medium/media. The method may be implemented via one or more processors on one or more machines executing such instructions.

In general, in another aspect, the invention is directed to a system for transferring data via a communication session between a client application and a server application, where the client application runs on a first network and the server application runs on a second network. The system includes a proxy having a socket to the client application. The proxy converts data between a local protocol run on the first network to a non-local protocol. An agent creates a socket to the server application. The agent converts data between a local protocol run on the second network and the non-local protocol. A server is in communication with the proxy and the agent. The server contains a message queue dedicated to the communication session. The message queue stores data transmitted during the communication session. This aspect may include one or more of the following features.

The proxy may poll the server for data for the client application. When data is present for the client application, the proxy may retrieve the data from the message queue and pass the data to the client application. The agent may poll the server for data for the server application. When data is present for the client application, the agent may retrieve the data from the message queue and pass the data to the server application.

Other features and advantages of the invention will become apparent from the following description, including the claims and drawings.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating the concept of a virtual tunnel between two computer programs.

FIG. 2 is a block diagram of a network containing computer programs (client application and server application) that communicate via a virtual tunnel.

FIG. 3 is a flowchart showing a process for creating a virtual tunnel.

DESCRIPTION

The system described herein creates a virtual communication link (called a "virtual tunnel") between two computer programs (e.g., client and server applications) that are not able to address each other directly. This situation may occur when a client application needs to connect to a server application at a remote site. The server application may be on a computer on a customer or partner's non-addressable local network (e.g., behind a firewall). As such, the client application will not be able to address the server application directly.

A virtual tunnel may be used to provide the client application access to the server application. FIG. 1 illustrates the concept of a virtual tunnel 8 between client application 10 and server application 11. Virtual tunnel 8 enables client application 10 and server application 11 to communicate as if there were no firewalls between them (which, typically, there are).

FIG. 2 shows a client local network 14. Client local network 14 includes a device 15, such as a computer, that contains a processor 16, a memory 17, and a storage medium 19 for storing, among other things, an operating system (OS) 20, a Web browser 21, software 22 for effecting network communications, and one or more executable applications (e.g., computer programs). Among these applications is client application 24. Client application 24 is a computer program for communicating with and diagnosing local or remote hardware and/or software.

A router (or modem) 25 couples client local network 14 to an external network 26, such as the Internet/World Wide Web (Web). External network 26 may run Internet Protocol (IP), HyperText Transfer Protocol (HTTP) and other suitable protocols. Network connections may be via Ethernet, telephone line, wireless, or other transmission media.

A firewall 27 is maintained between client local network 14 and external network 26. Firewall 27 may be implemented via software run on the closest "intelligent" device to external network 26, e.g., router 25 or device 15. The firewall prevents others from directly addressing devices on client local network 14 via external network 26. As a result of the firewall, only users on client local network 14 (or some defined subset thereof) are permitted to address device 15 directly.

Client local network 14 may run a local protocol, such as Transmission Control Protocol/Internet Protocol (TCP/IP), which may be the same as, or different than, the protocols that run on external network 26. Examples of other protocols that may be run on client local network 14 include, but are not limited to, serial protocols, such as RS232 and RS485, and proprietary protocols.

Client local network 14 also includes proxy 29, which is used to effect communication between client application 24 and a remote server application. Proxy 29 may be a computer program executing on device 15 or another processing device, such as a router 25, in client local network 14. In addition to the functions described below, proxy 29 performs any conversions necessary between the protocols running on external network 26 and those running on client local network 14.

FIG. 2 also shows a server local network 30. Server local network 30 is depicted as being similar to client local network 14 for the sake of illustration. In reality, however, the two local networks may be very different.

Server local network 30 includes a device 31, such as a server, that contains a processor 32, a memory 34, and a storage medium 35 for storing, among other things, an operating system (OS) 36, software 37 for effecting network communications, and one or more executable applications (e.g., computer programs). Among these applications is server application 39. Server application 39 is a computer program that may, among other things, provide information to users via external network 26 or via local network 30. Examples of such information include, but are not limited to, Web pages and diagnostics or operational control information pertaining to the device.

A router (or modem) 40 couples server local network 30 to external network 26. As above, network connections may be via Ethernet, telephone line, wireless, or other transmission media. A firewall 41 is also maintained between server local network 30 and external network 26. Firewall 41 may be implemented via software run on the closest "intelligent" device to external network 26, e.g., router 40 or device 31. The firewall prevents others from directly addressing device 31 via external network 26. As above, only users on server local network 30 (or some subset thereof) are permitted to address device 31 directly.

Server local network 30 may run a local protocol that may be the same as, or different than, protocols that run on external network 26 and/or client local network 14. Examples of such protocols include, but are not limited to, TCP/IP, serial protocols, such as RS232 and RS485, and proprietary protocols.

Server local network 30 also includes agent 42, which is used to effect communication between client application 24 and server application 39. Agent 42 may be a computer program executing on device 31 or another processing device, such as a router 40, in server local network 30. In addition to the functions described below, agent 42 performs any conversions necessary between the protocols running on external network 26 and those running on server local network 30.

Agent 42 has a local configuration of interfaces. Each interface has a name, IP (Internet Protocol) address, or other information relevant to the local protocol, such as baud rate. Local configuration of the interfaces allows a local operator to control access to applications on server local network.

Proxy 29 and agent 42 perform essentially the same functions (described below) which allow client application 24 and server application 39 to communicate via a virtual tunnel. Proxy 29 and agent 42 may be pre-programmed into devices on respective local networks 14 and 30. Alternatively, one or both of proxy 29 and agent 42 may be downloaded, e.g., from external network 26. For example, in one embodiment, proxy 29 is an applet that is downloaded from a server 44 on external network 26 and that is installed on device 15. The applet may be included in a Web page that is provided by server 44, and that is accessed by a user when establishing a virtual tunnel between client application 24 and server application 39. This process is described in more detail below.

External network 26 contains server 44, which is a computer or any other processing device. Other devices (not shown) are also located on external network 26. For example, external network 26 may contain routers, switches, and the like (not shown), which receive data packets and which forward the data packets along paths to their intended destinations. Other servers, personal computers, mainframes, and processing devices (not shown) may also be on, and/or have access to, external network 26.

Server 44 acts as an intermediary for communications between client application 24 and server application 39 in the manner described below. Server 44 runs HTTP (Hypertext Transfer Protocol) and is "visible" to other devices, such as device 15, via external network 26.

In more detail, server 44 is used in passing data between client application 24 and server application 39 because these applications cannot address each other directly. That is, since both applications are on local networks, they do not have universally-recognized network addresses. As such, the client and server applications cannot address one another without the aid of server 44.

Server 44 includes a controller, such as a microprocessor, for executing software (machine-executable instructions) stored in a memory to perform the functions described below. To avoid confusion in terminology, the following reads as though those functions are performed by server 44, even though software in server 44, namely virtual tunneling application 45, performs the functions.

In this embodiment, server 44 contains a processor 46, a memory 47, and a storage medium 49 for storing, among other things, an operating system (OS) 50, software 51 for effecting network communication, and one or more applications. Processor 46 may execute software, including the applications, out of memory 47. Among these applications is tunneling application 45.

Tunneling application 45 creates a virtual tunnel between client application 24 on client local network 14 and server application 39 on server local network 30. Tunneling application 45 includes process 54 (FIG. 3) to establish the virtual tunnel, as described below. The virtual tunnel allows client application 24 and server application 39 to communicate even though they are both behind firewalls and cannot directly address each other.

The virtual tunnel is also advantageous because it preserves the protocols running on local networks 14 and 30. That is, data is transferred through the virtual tunnel via an intermediary protocol, such as HTTP, that is run on external network 26. The protocols running on local networks 14 and 30 are essentially transmitted via the protocol of external network. When data reaches its destination, e.g., at local network 14 or 30, the local protocol is thus recovered by either proxy 29 or agent 42, thereby enabling the same protocol to be used at both the source and destination local networks. Proxy 29 and agent 42 are both capable of converting between a local protocol and the intermediary protocol. In this regard, it is noted that the intermediary protocol may be the same as, or different from, the local protocols.

FIG. 3 shows process 54 that is performed by proxy 29, server 44, and agent 42 to set-up a virtual tunnel for a communication session between client application 24 and server application 39. The section of FIG. 3 labeled "Agent" corresponds to functions performed by agent 42; the section of FIG. 3 labeled "Proxy" corresponds to functions performed by proxy 29; and the section of FIG. 3 labeled "Server" corresponds to functions performed by tunneling application 45 (on server 44).

Referring to FIG. 3, agent 42 sends (60), to server 44, interface information, including, but not limited to, interface names and port numbers of agent 42 associated with server application 39. The interface information may be sent, e.g., in response to installing agent 42 on local network 30. Server 44 receives (61) the interface information and stores the interface information in a database (not shown). The database is associated with agent 42.

Information in the database may be made accessible to a user, e.g., at device 15 via a Web browser. The information may be made accessible via a Web page (not shown) provided by server 44. The Web page may contain a list of devices on local network 30 that may be accessed via virtual tunneling. The identities of the devices, which may be provided to server 44 along with the interface information, are associated with software interfaces to such devices. When a user selects a device to connect to, the user is, in effect, selecting an interface of agent 42.

A user who wants to connect to a device on local network from client application 24 logs into server 44 via a Web page (not shown). The user then selects a device (and, thus, an interface) to begin a communication session with that device. Server 44 receives (62) the input from the Web page. As noted above, the Web page may contain an applet that comprises proxy 29. In this case, when the user selects a device and enters the selection, the applet may be installed on device 15 as proxy 29.

Server 44 may control access to agents and interfaces through a predefined security (access) policy. For example, server 44 may allow some users, but not others, access to devices on local network 30. Likewise, users may be restricted as to which devices they may access. Server 44 may control access based on user IDs (identifiers) and/or passwords assigned to system users. For example, server 44 may maintain a database of user IDs and/or passwords corresponding to devices that are accessible via those user IDs and/or passwords. If a user attempts to establish a communication session with a device for which he has not been permitted access, server 44 may provide that user with an error message or the like.

Assuming that the user has access to the requested device, in process 54, server 44 creates (63) a session object for the current communication session. The session object contains message queues. The message queues are used to store data that is passed between client application 24 and server application 39.

In this embodiment, the session object contains two message queues (other embodiments may contain more, or less, message queues). One message queue is for data going from client application 24 to server application 39 and the other message queue is for data going from server application 39 to client application 24.

The session object also has an associated session identifier, referred to as a "sessionID" string. The sessionID string may be a unique alphanumeric identifier that identifies communications associated with a particular communication session. As described below, all data transfers associated with a communication session between client application 24 and server application 39 pass through server 44. The sessionID string is used by server 44 (in particular, by tunneling application 45) to store the data in the appropriate message queues(s).

In process 54, server 44 sends (64) the sessionID string and selected interface name to agent 42. Agent 42 receives (65) this message and creates (66) a socket using the port and IP address that correspond to the selected interface name. Agent 42 connects (67) the socket to server application 39. If connection fails, agent 42 reports an error to server 44. It is noted that sockets are used in this embodiment because they are a well-known way of communicating. Other means of communication may be used, including proxies, pipes, serial communications, etc.

In process 54, server 44 also sends (64) the sessionID string and port or other protocol parameters to proxy 29. Proxy 29 receives (68) this message and creates (69) a socket using the port that corresponds to client application 24. Proxy 29 then provides (70) an "accept" instruction on that socket. The accept instruction enables proxy 29 to accept data from client application 24.

Both proxy 29 and agent 42 execute a software thread to poll (71, 72) for data on their respective sockets, and also to poll for data from server 44. When data from client application 24 is received on a socket of proxy 29, proxy 29 appends the appropriate sessionID string to the data and passes the data to server 44. The sessionID string enables server 44 to identify the data as belonging to a particular communication session, and to store the data in the appropriate message queue. Agent 42 polls for data from server 44, meaning that it searches for data from server 44 that is stored in message queues for agent 42. If there is data present, agent 42 retrieves the data, identifies the communication session using the sessionID string associated with the data, and passes the data to server application 39 via the established socket.

The converse occurs for data passed from server application 39 to client application 24. More specifically, data from server application 24 is received on a socket of agent 42. Agent 42 appends the sessionID string for the current communication session to the data and passes the data to server 44. Proxy 29 polls for data from server 44. If there is data present in an appropriate message queue, proxy 29 retrieves the data, identifies the communication session using the sessionID string, and passes the data to client application 24.

On each socket, a select or "recv" (receive) instruction (command) determines if there is data to read. When data is read from a socket, the data may be sent to server 44 (by proxy 29 or agent 42) as the body of an HTTP POST command. Data in server 44 may be polled (by proxy 29 or agent 42) using an HTTP GET command. If there is data in server 44, the data is passed in a reply to the GET command. This data is then written to the appropriate socket. When an HTTP command is sent, its URL parameters include a "session=SSS" parameter, where "SSS" is the sessionID for a communication session.

As noted above, server 44 has a session object that contains two message queues. Data sent from proxy 29 is stored in one message queue and delivered when agent 42 issues a GET command. The other message queue contains data being passed from agent 42 to proxy 29.

Proxy 29 and agent 42 may encrypt communications sent to server 44. Examples of encryption that may be used include Secure Sockets Layer (SSL) and Hyper Text Transfer Protocol Secure sockets (HTTPS). The recipient (e.g., proxy 29 or agent 42) should have sufficient capabilities to perform any necessary decryption.

In this embodiment, there are two ways to end a communication session (i.e., terminate a virtual tunnel). The session may end when either client application 24 or server application 39 closes its socket. However, some applications open and close sockets during the normal course of communications. For applications such as these, the user may terminate the session manually when the applications are finished running. The user may choose a termination scenario when creating the session.

Server 44 may maintain an audit log (i.e., record) of communication sessions. The audit log may identify the user, time, duration, agent, interface, and number of bytes transferred in a communication session. The actual data may be stored as human-readable text or in another format. Audit logs are particularly advantageous in diagnostic and repair scenarios, where it is often necessary to identify device modifications and repairs after the fact.

Server 44 may be associated with multiple servers, one or more of which may act as a load balancing server to distribute communications amongst other servers. In this case, when a session object is created, the session object may be created on a server that has the most (or greater than a predetermined amount of) resources available and/or a server that is located closest to (or within a predetermined location of) agent 42. In this case, the Uniform Resource Locator (URL) of the server that is being used to effect communication is sent to agent 42 and proxy 29, along with the sessionID. In all subsequent communications, proxy 29 and agent 42 include the URL of the server. This ensures that a single server handles a single communication session.

The virtual tunnel system described herein is not limited to use with the hardware/software configuration of FIGS. 2 and 3; it may find applicability in any computing or processing environment. The functionality of the virtual tunnel system, including, but not limited to, the functions performed by proxy 29, server 44, and agent 42, may be implemented in hardware (e.g., an ASIC {Application-Specific Integrated Circuit} and/or an FPGA {Field Programmable Gate Array}), software, or a combination of hardware and software.

The virtual tunnel system may find applicability in any computing or processing environment and with any type of machine that is capable of running machine-readable instructions, such as one or more computer programs.

The virtual tunnel system can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The virtual tunnel system can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.

Method steps implemented to effect virtual tunneling can be performed by one or more programmable processors executing one or more computer programs to perform functions described herein by operating on input data and generating output. Method steps can also be performed by, and the virtual tunnel system can be implemented as, special purpose logic circuitry.

Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. Elements of a computer include a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from, or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in special purpose logic circuitry.

The virtual tunnel system can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with the virtual tunneling system, or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network ("LAN") and a wide area network (WAN"), e.g., the Internet.

The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

The process described above is not limited to the implementations set forth herein. For example, the process is not limited to use with the virtual tunnel system described herein, but rather may be implemented in any type of network-based communication system.

It is noted that client application 24 and server application 39 may communicate directly when a direct connection can be achieved (e.g., if they are on the same network). To effect direct communication, if client application 24 and server application 39 use TCP/IP, server application 39 creates a socket on a specific port. Client application 24 also creates a socket and connects to this port. If server application 39 runs on another computer, client application 24 also specifies the network address of that computer. At this point, the client and server are connected and begin communicating.

The local protocols run on local networks 14, 30 may be TCP/IP or a serial protocol, such as RS232 or RS485. The protocol run on external network 26 may be HTTP. The virtual tunnel may comprise a telnet session (e.g., the tunnel is implemented during the telnet session).

It is noted that more than one agent may be present on local network 30 and more than one proxy may be present on local network 14. There may be a one-to-one correspondence between devices and agents and between devices and proxies. Alternatively, a single proxy may service different devices and, likewise, a single agent may service different devices. Similarly, multiple proxies may service the same device and multiple agents may service the same device.

The sessionID string may expire after a predetermined period of time, necessitating a new communication session. For example, the sessionID may expire after a period during which no communications are exchanged. This period may be programmed into server 44. Similarly, the sessionID string expires when a communication session terminates.

Other embodiments not described herein are also within the scope of the following claims.

* * * * *

References


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed